An empirical analysis of phishing blacklists S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang Carnegie Mellon University, 2009 | 533 | 2009 |
Lexical feature based phishing URL detection using online learning A Blum, B Wardman, T Solorio, G Warner Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security …, 2010 | 276 | 2010 |
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis A Oest, Y Safei, A Doupé, GJ Ahn, B Wardman, G Warner 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018 | 145 | 2018 |
System and method for branding a phishing website using advanced pattern matching G Warner, B Wardman US Patent 8,381,292, 2013 | 59 | 2013 |
System and method for identifying a phishing website G Warner, B Wardman US Patent 8,468,597, 2013 | 54 | 2013 |
A flow-based approach for Trickbot banking trojan detection A Gezer, G Warner, C Wilson, P Shrestha Computers & Security 84, 179-192, 2019 | 53 | 2019 |
Mining spam email to identify common origins for forensic application C Wei, A Sprague, G Warner, A Skjellum Proceedings of the 2008 ACM symposium on Applied computing, 1433-1437, 2008 | 51 | 2008 |
High-performance content-based phishing attack detection B Wardman, T Stallings, G Warner, A Skjellum 2011 eCrime Researchers Summit, 1-9, 2011 | 48 | 2011 |
A multimodal data mining framework for revealing common sources of spam images. C Zhang, WB Chen, X Chen, R Tiwari, L Yang, G Warner Journal of multimedia 4 (5), 2009 | 38 | 2009 |
Identifying vulnerable websites by analysis of common strings in phishing URLs B Wardman, G Shukla, G Warner 2009 eCrime Researchers Summit, 1-13, 2009 | 32 | 2009 |
Automating phishing website identification through deep MD5 matching B Wardman, G Warner 2008 eCrime Researchers Summit, 1-7, 2008 | 30 | 2008 |
Social media image retrieval using distilled convolutional neural network for suspicious e-crime and terrorist account detection P Chitrakar, C Zhang, G Warner, X Liao 2016 IEEE International Symposium on Multimedia (ISM), 493-498, 2016 | 28 | 2016 |
Analysis of back-doored phishing kits H McCalley, B Wardman, G Warner Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference …, 2011 | 28 | 2011 |
Evaluating a semisupervised approach to phishing url identification in a realistic scenario B Gyawali, T Solorio, M Montes-y-Gómez, B Wardman, G Warner Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti …, 2011 | 27 | 2011 |
Koobface: The evolution of the social botnet BK Tanner, G Warner, H Stern, S Olechowski 2010 eCrime Researchers Summit, 1-10, 2010 | 23 | 2010 |
Clustering Potential Phishing Websites Using {DeepMD5} J Britt, B Wardman, A Sprague, G Warner 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012 | 22 | 2012 |
Phish-net: investigating phish clusters using drop email addresses S Zawoad, AK Dutta, A Sprague, R Hasan, J Britt, G Warner 2013 APWG eCrime Researchers Summit, 1-13, 2013 | 19 | 2013 |
Phishing: Crime that pays PJ Nero, B Wardman, H Copes, G Warner 2011 eCrime Researchers Summit, 1-10, 2011 | 19 | 2011 |
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm C Wei, A Sprague, G Warner Proceedings of the 2009 ACM symposium on Applied Computing, 889-890, 2009 | 19 | 2009 |
Automating phishing website identification through deep MD5 matching. In eCrime Researchers Summit, 2008 B Wardman, G Warner Atlanta, GA, 2008 | 18 | 2008 |